General Information

Tyco Security Products, has partnered with Alarm.com, to offer industry-leading interactive service solutions to support its DSC Intrusion Security products.

The blend of leading interactive hardware and innovative connected home services such as interactive security, video monitoring, energy management and home automation provide a leading, future-proof platform provided by Wotch Pty Ltd..

For further information on Alarm.com Services visit www.alarm.com

 

DSC Impassa
  • Supports 64 wireless zones and 16 wireless keys (without using a zone slot)
  • Optional integrated HSPA (3G) cellular, internet or dual communicator
  • Cellular signal strength read-out to optimize placement
  • Built-in 2-way audio VOX and push-to-talk alarm communication via phone line and cellular
  • 2-way is available only on IMPASSA 9057 Self-Contained Wireless Security Systemt
  • 4 keypad
  • 4 sirens
  • 16 wireless keys
  • Remote firmware upgrade via cellular/internet
  • Easy wireless device enrollment process
  • Template programming
  • Full 32-character programmable labels
  • Enlarged keypad buttons
  • 5 programmable function keys
  • Individual FAP keys
  • 17 user access codes
  • 500 event buffer
  • False alarm reduction features (CP-01
  • Outdoor temperature display
  • Label Library
  • Compatible with leading edge interactive services supported by DSC SCW9057 model only

For further information on DSC Impassa. Click Here.

DSC Power Neo
  • 6 on-board zones
  • Expandable to 16 wireless and hardwired zones
  • 2 PGM outputs: expandable to 22 (HSM2204, HSM2208)
  • Template programming
  • Connect up to 8 supervised keypads with keypad zones
  • 2 partitions
  • 500-event buffer
  • 48 user codes

For further information on DSC Neo. Click Here

DSC Touch

DSC Touch is an innovative smart panel which provides customers with home management and interactive security capabilities in an all-in-one, intuitive and easy to use interface.

Uniquely based on Google’s Android operating system and integrated with Alarm.com, DSC Touch employs WiFi, Bluetooth and Z-Wave technology for a completely wire-free install and ‘all-in-one’ wireless communications.

  • 7 inch with 800 x 480 resolution
  • Built in apps such as Contact info and Photo Frame
  • Compatible with DSC 433Mhz One-way wireless products
  • Dual-path connectivity with integrated WiFi and Cellular
  • Z-Wave, Bluetooth, Image Sensor and Cellular radios built in to work with smart home automation
  • Integrated with Alarm.com to offer Interactive Services through iOS and Android apps
  • Built in Camera, takes photos on Disarm and Alarm events
  • Built-in siren
  • Built-in two-way voice over Cellular
  • Software updates over WiFi and manually with a SD card
  • Supports 59 Wireless zones and 242 User codes

What is Z-Wave?

Zwave (or Z wave or Z-wave) is a protocol for communication among devices used for home automation. It uses RF for signaling and control.

Zwave was developed by Zensys, Inc. a start-up company based in Denmark. Zwave was released in 2004. Based on the concepts of Zigbee, Zwave strives to build simpler and less expensive devices than Zigbee. In 2009 Sigma Designs of Milpitas, CA purchased Zensys/Zwave.

Dozens of manufacturers make Zwave compatible (to a lessor or greater extent) products, mostly in the lighting control space.

THE BASICS

Zwave operates at 908.42 MHz in the US (868.42 MHz in Europe) using a mesh networking topology. A Zwave network can contain up to 232 nodes, although reports exist of trouble with networks containing over 30-40 nodes. Zwave operates using a number of profiles (think of them like languages), but the manufacturer claims they interoperate. Use care when selecting products as some products from certain manufacturers are not compatible with other manufacturers’ products.

Zwave utilizes GFSK modulation and Manchester channel encoding.

A central, network controller, device is required to setup and manage a Zwave network. Each product in the home must be “included” to the Zwave network before it can be controlled via Zwave (and before it can assist in repeating/hoping within the mesh network).

Each Z-Wave network is identified by a Network ID and each device is further identified by a Node ID.

The Network ID (aka Home ID) is the common identification of all nodes belonging to one logical Z-Wave network. Network ID has a length of 4 bytes and is assigned to each device by the primary controller when the device is added into the network. Nodes with different Network ID’s cannot communicate with each other.

The Node ID is the address of the device / node existing within network. The Node ID has a length of 1 byte.

Z-Wave uses a source-routed mesh network topology and has one primary controllers. Secondary controllers can exist, but are optional. Devices can communicate to one another by using intermediate nodes to route around and circumvent household obstacles or radio dead spots that might occur though a message called “healing”. Delays will be observed during the healing process. A message from node A to node C can be successfully delivered even if the two nodes are not within range, providing that a third node B can communicate with nodes A and C. If the preferred route is unavailable, the message originator will attempt other routes until a path is found to the “C” node. Therefore, a Z-Wave network can span much farther than the radio range of a single unit; however, with several of these hops a slight delay may be introduced between the control command and the desired result.[5] In order for Z-Wave units to be able to route unsolicited messages, they cannot be in sleep mode. Therefore, battery-operated devices are not designed as repeater units. A Z-Wave network can consist of up to 232 devices with the option of bridging networks if more devices are required.

As a source routed static network, Z-Wave assumes that all devices in the network remain in their original detected position. Mobile devices, such as remote controls, are therefore excluded from routing.

Z-wave released later versions with added network discovery mechanisms so that ‘explorer frames’ could be used to heal broken routes caused by devices that have been moved or removed. A Pruning algorithm is used in explorer frame broadcasts and are therefore supposed to reach the target device, even without further topology knowledge by the transmitter. Explorer frames are used as a last option by the sending device when all other routing attempts have failed.